Reinforcement learning with graph neural network (RL-GNN) fusion for real-time financial fraud detection: a context-aware community mining approach. [PDF]
Devi RR, Raja JE, Chin YB.
europepmc +1 more source
Enhancing virtual physically unclonable function security through neuron-criticality analysis and lightweight encryption. [PDF]
Khan R +4 more
europepmc +1 more source
Transfer learning and AI technology for family school community collaborative model research in university network security management. [PDF]
Feng Q, Chen Y.
europepmc +1 more source
Tackling Hardware Trojans via Hardware-based Methodologies
Hardware Trojans (HTs) represent significant challenges to the security and reliability of modern microprocessorbased systems. This manuscript introduces two complementary approaches to enhance hardware security. First, programmable Hardware Security Modules are proposed to detect Hardware Trojan Horses by monitoring instruction-fetch activities ...
openaire +1 more source
Transfer learning with XAI for robust malware and IoT network security. [PDF]
Almadhor A +6 more
europepmc +1 more source
Efficient feature ranked hybrid framework for android Iot malware detection. [PDF]
Saeed NH +3 more
europepmc +1 more source
Process control block information dataset: Towards android malware detection. [PDF]
Alawneh H, Alkofahi H.
europepmc +1 more source
Image Super-Resolution Reconstruction Network Based on Structural Reparameterization and Feature Reuse. [PDF]
Li T, Jin X, Liu Q, Liu X.
europepmc +1 more source
OntoSecAI: Ontology-driven security automation for AI-enabled systems. [PDF]
Ullah U, Haleem M, Ullah A.
europepmc +1 more source
Tackling Hardware Trojan Horses via Hardware-based Methodologies
Hardware-based approaches to detect bit-flips, unauthorized program runs, and tampering.
openaire +1 more source

